Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports (2004.14322v1)

Published 29 Apr 2020 in cs.CR and cs.LG

Abstract: Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professionals to access increasingly larger amounts of heterogeneous data. Among those, cyber attacks' Tactics, Techniques and Procedures (TTPs) have proven to be particularly valuable to characterize threat actors' behaviors and, thus, improve defensive countermeasures. Unfortunately, this information is often hidden within human-readable textual reports and must be extracted manually. In this paper, we evaluate several classification approaches to automatically retrieve TTPs from unstructured text. To implement these approaches, we take advantage of the MITRE ATT&CK framework, an open knowledge base of adversarial tactics and techniques, to train classifiers and label results. Finally, we present rcATT, a tool built on top of our findings and freely distributed to the security community to support cyber threat report automated analysis.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Valentine Legoy (1 paper)
  2. Marco Caselli (4 papers)
  3. Christin Seifert (46 papers)
  4. Andreas Peter (15 papers)
Citations (47)

Summary

We haven't generated a summary for this paper yet.